►
From YouTube: [LIVE] Devcon3 Day 4 Stream - Morning
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
B
B
B
Imagine
the
unprecedented
level
of
liberty
and
security
for
all,
and
so,
if
we
want
to,
if
we
want
to
advance
the
cause
of
Liberty,
we
should
strive
to
develop
all
kinds
of
defensive
technologies,
and
this
is
whispers
all
about.
So
today,
we're
going
to
talk
about
achieving
darkness
with
whisper,
so
whisper
is
a
messenger
system
for
distributed
applications
and
the
most
secure
mode
of
operation
is
supposed
to
be
able
to
achieve
darkness
at
considerable
expense
in
terms
of
processor
power,
bandwidth,
etc.
B
So
whisper
was
designed
to
be
integral
part
of
the
theorem
ecosystem
and
offers
off
chain
communication
between
the
DD
apps.
So
it
has
nothing
to
do
with
blockchain
it's
off
chain.
The
reason
for
that
is
because
of
change.
Communication
is
much
cheaper
and
if
you
don't
need
consensus,
you
just
need
to
send
the
message
you
use
whisper
and
so
whisper
uses
underline
etherium
communication
protocol
to
take
care
of
message.
B
C
C
Until
it
reaches
the
recipient
that
manages
to
decrypt
the
message
you
will
notice
that
actually
this
doesn't
stop
here,
even
though
the
message
has
reached
its
recipient,
the
recipient
was
so
forward
to
its
neighboring
node
and
that's
to
not
be
identified
as
the
recipients.
Other
words
that
would
leak
metadata.
C
So
how
do
you
that
these
are
a
lot
of
messages?
How
do
you
prefer
prevents
people
from
spamming
do
net
network?
We
we
use
proof
of
work,
I,
don't
I,
assume
I,
don't
have
to
tell
you
what
it
is,
but
yeah.
That's
how
you
throw
all
the
traffic
on
the
network,
so
there
are
some
advantages
to
this
approach.
First,
it's
decentralized!
Obviously,
because
you
you
do
not
have
to
send
it
to
one
central
authority
like
whatsapp
or
Google
Talk.
C
C
C
There's
a
high
processor
load,
because
you
need
to
try
to
decrypt
messages,
even
if
they're
not
intended
for
you,
and
on
top
of
that
you
need
to
keep
a
copy
of
the
messages
in
memory,
because
you
might
be
sent
messages
that
you
already
sent
and
you
do
not
want
to
to
overload
the
system
with
sending
extra
messages.
So
you
need
to
keep
messages
in
memory
a
bit
longer
and
that's
that's
costly
as
well.
So
the
way
the
message
works,
we
have
time
to
leave
in
an
expiry,
which
is
what
I
described.
C
How
long
you
should
keep
the
message
in
memory.
You
have
the
nonce
which
is
related
to
the
proof-of-work
and
you
have
the
encrypted
payload,
which
is
the
message
itself,
and
we
also
provide
a
heuristic
to
to
help
the
note
determine
if
it's
worth
decrypting
the
message
or
not
to
try
to
save
a
bit
of
a
processor
processor
load.
So
this
this
heuristic
is
called
two
topics:
it's
four
bytes
of
arbitrary
data.
C
It's
very
short
it's
on
purpose
and
the
goal
for
that
is
so
that
you
cannot
be
identified
with
your
with
your
topic,
so
other
participants
on
the
node
on
the
network
will
probably
set
the
same
very
probably
set
the
same
topic,
so
you
will
be
able
to
deny
that
the
message
was
internet
for
you
in
version
6.
We
also
want
to
be
let
the
notes,
what
kind
of
topics
they
want
to
receive
and
that
will
reduce
the
darkness,
but
that
will
also
reduce
the
workload.
B
So
for
recipient,
it's
quite
easy
to
achieve
darkness,
because
recipient
gets
all
the
messages
tries
to
decrypt
them
in
case
of
success,
reads
the
message
and
nobody
from
outside
can
detect
it.
The
only
thing
the
recipient
should
take
care
of
is
treat
all
the
messages
equally,
so
even
those
messages
he
can
read
should
should
be
forwarded,
and
if
you
use
default
implementation
of
God,
then
it's
already
taken
care
of
for
the
sender.
Of
course.
B
In
some
cases
the
adversary
can
see
that
the
message
was
originated
in
this
node,
so
how
to
achieve
darkness.
Well,
you
can
try
to
maintain
certain
level
of
noise.
For
example,
you
send
messages
every
so
often
and
if
you
have
something
to
say,
you
encrypt
a
meaningful
message:
if
not
and
you
encrypt
some
random
data
and
it
will
be
indistinguishable
and
also
I
would
recommend
to
use
different
topics
and
keys
and
whatnot
for
incoming
and
for
outgoing
messages.
Because
imagine
if
you
have
two
nodes
on
the
network,
they
communicate
with
each
other.
B
So
you
cannot
really
detect
who
communicates
with
whom,
unless
those
two
nodes
send
messages
with
the
same
topic
or
those
messages.
Other
trades
message,
size,
frequency,
proof-of-work
and
so
on,
and
so
it's
better
to
have
that
messages,
outgoing
and
incoming.
Don't
share
common
traits.
So
message
size
is
another
important,
trait
important
metric,
which
you
can
potentially
liquid
information,
and
that's
why
we
have
introduced
a
parent
field.
B
So
imagine
that
you
have
you
maintain
a
certain
level
of
noise,
so
you
send
messages
every
so
often
and
every
message
is
approximately
one
kilobyte
and
then
all
of
a
sudden,
you
need
to
send
this
short
message
like
in
this
case
goodbye
big
brother
and
then
it's
it's
very
different.
So
what
you
can
do,
you
can
randomly
generate
some
data
and
put
into
the
parent
field,
and
then
you
encrypt
the
entire
message
and
those
fields
are
indistinguishable,
so
you
can
adjust
message,
size
and
default.
B
So
you
can
actually
set
any
size.
You
want
also.
Our
default
implementation
allows
symmetric
and
asymmetric
encryption
for
messages
the
case
of
symmetric
encryption.
If
you
engage
in
this
communication
with
somebody
else,
it
means
that
you
have
already
exchanged
the
secret
key
through
some
kind
of
secure
channel
and
I
would
recommend
to
use
exactly
the
same
channel
whatever
it
is
to
exchange
also
the
topics
and
all
the
other
related
information
and.
B
Yeah,
so
it's
easy,
but
for
a
symmetric
encryption,
what
usually
happens?
Is
you
advertise
your
public
key
in
some
open
channel
and
you
probably
are
not
willing
to
publish
the
topic
because
in
this
case,
message
sent
with
this
topic.
Adversary
can
guess
that
message
was
addressed
to
you
so,
but
if
you
try
to
decrypt
all
the
incoming
messages,
it
might
be
too
expensive
in
terms
of
processor
power.
So
what
you
can
do
you
can
require
a
higher
proof-of-work
for
messages
without
the
topic
and
also
you
can
advertise
partial
topic.
D
B
Would
also
recommend
to
use
the
learn
long-term
keys
only
to
establish
the
session,
so
you
generate
session
keys
for
outgoing
and
incoming
messages.
You
generate
the
topics,
preferably
randomly,
and
you
sent
the
first
message
to
establish
the
session
and
this
message
will
be
encrypted
in
with
with
the
long
term
key,
and
then
you
proceed
to
communicate
normally
with
ephemeral,
keys
and
after
the
session
is
over,
the
keys
are
deleted
and
nobody
will
be
able
to
decrypt
those
messages
again,
if
you
don't
store
them.
B
But
our
API
allows
easy
access
to
this
field.
So
what
you
can
do
you
can
stop
stitute
add-in
with
some
secret
message.
For
example,
you
have
some
secret
message
in
this
case:
lorem
ipsum,
and
then
you
encrypt
the
message
with
some
completely
different
key.
You
put
the
encrypted
message
in
the
padding
field.
Then
you
can
post
some
innocent-looking
message
like
in
this
case.
I
have
nothing
to
hide,
and
then
you
encrypt
everything
and
yeah
encrypted
message.
So
in
the
future,
if
you're
compromised,
if.
B
B
B
And
therefore
you
don't
need
any
requirement,
so
you
can
abandon
that
and
also
the
number
of
nodes
is
have
bandwidth
constraints,
and
so
you
will
not
have
latency
and
you
can
engage
in
instant
messaging.
You
can
engage
in
voice
calls.
Video
calls
whatever
and
the
only
in
the
adversary
can
say
about
the
participant.
Is
that
they
part
of
this
network
and
in
case
of
some
organizations
it's
it's
already
known.
B
B
Some
people
ask
me
if
it's
possible
to
use
the
custom
encryption
instead
of
whisper
encryption,
because
they
don't
trust
our
whisper
courage
and
I'm
always
happy
to
see
to
hear
such
questions,
because
it
shows
that
people
are
serious
about
security.
And
the
answer
is
that
you
cannot
substitute
with
to
encryption
by
the
custom
encryption.
But
you
can
encrypt.
On
top
of
our.
B
And
in
cryptographic,
community
is
usually
discouraged
to
use
custom
encryption,
but
in
this
case,
if
you
do
it
on
top
of
whisper
encryption
with
unrelated
keys,
you
can
do
no
harm
and
I
actually
want
to
encourage
people
to
continue
research
and
development
in
encryption.
Because,
first
of
all,
you
should
not
be
complacent.
B
It's
very
promising
technology,
namely
cryptography
offers
such
a
huge
advantage
to
the
defenders
over
those
who
try
to
attack,
and,
of
course,
what
kind
of
self-appointed
with
the
bodies
are
going
to
be
very
unhappy
about
it
because
they
see
the
writing
on
the
wall.
The
technology
makes
them
obsolete
and
they
will
no
longer
be
able
to
control
the
free
speech
and
all
the
king's
horses
are
not
going
to
help
them,
and
if
you
hear
them
saying
that
encrypted
communication
is
very
dangerous
and
especially
if
they
advertise
the
services
to
protect
you
from
those
dangerous.
B
B
So
one
is
the
proof
of
work
and
investors
version.
6
is
going
to
be
dynamic,
so
you
can
dynamically
send
proof
of
that
proof
of
work,
and
if
traffic
is
too
high,
you
can
increase
it
on
the
fly,
but
also
we
will
have
bloom
filter
exchange
protocol
for
the
topics,
and
so
you
will
be
able
to
set
up
those
bloom
filters
in
such
a
way
that
you
can
probabilistically
assess
how
many
messages
you
get.
B
B
C
B
F
B
Yeah,
so
my
answer
is
that
people
did
conspire
and
people
did
commit
a
lot
of
crime
and
they
use
all
kind
of
stuff
to
do
it,
roads
and
out
cars
and
whatnot,
and
so
this
is
what
we
are
doing.
This
is
purely
defensive
technology.
You
cannot
use
it
to
attack
somebody.
You
can
use
it
to
defend
yourself,
even
if
you're
a
criminal
or
if
you
are
a
normal
person,
you
can
only
use
it
to
defend
yourself
and
whatever
the
the
the
people
will
later
say.
That
is
aggressive
and
whatnot.
C
We're
actually
working
on
that
one,
it's
it's!
It's
pretty
I
mean
right
now,
I'm,
given
the
protocol.
It's
still,
it's
really
really
high,
like
the
load
is
really
high.
So
this
killing
is
still
a
problem,
and
this
is
where
we're
going
to
introduce
v6.
So
we
don't
have
numbers
yet,
but
if
you're
interested
we
can
keep
in
touch
and
I'll
I'll
send
you
when
we
send
you
the
results.
When
we
we
start
developing,
it.
H
J
J
Yeah
nice
light
please,
oh
okay,
good
morning,
so
swarm
city,
so
just
as
many
other
eternian
projects
who
are
trying
to
this
one.
Thank
you
we
are.
This
is
our
vision.
Just
like
many
other
team
projects.
We
want
to
enable
humans
to
transact,
create
and
share
value
without
a
middleman
or
a
third
party
on
a
global
scale,
generating
contextual
reputation.
J
Our
mission
is
to
do
this
in
a
way
where
normal
people,
like
our
parents,
actually
understand
what
you
are
doing.
So
we
don't
wanna.
Have
people
experience
the
blockchain?
Basically,
we
want
to
really
make
it
really
easy
to
use.
Today
we
want
to
discuss
two
topics.
We
are
trying
to
solve
a
Tyrian
byte
problems
that
we
encounter
in
creating
an
app
that
is
consumer
facing.
So
the
first
thing
we
want
to
talk
about
is
the
IP
of
s
consortium.
The
second
one
is
the
gas
station.
J
K
Ok
good
morning,
everybody,
so
the
solution
we
came
up
with
for
the
ip-based
consortium
is
actually
that
we
created
smart
contracts.
So
by
the
way
this
works
on
top
of
another
persistency
consortium
project
by
piper
Miriam.
So
we
try
to
extend
it
a
little
bit
and
make
it
more
in
general
for
that
everybody
could
use
its
in
like
a
more
flexible
way.
So
we
created
a
smart
contract,
the
I
previous
proxy
contract,
and
this
contract
will
just
emit
events.
So
we
have
true
to
events
like
hash
added,
so
we
have
an
IP.
K
This
hash
gets
edit
or
needs
to
be
added
to
the
consortium.
It
has
a
time
to
live,
for
example,
and
then
the
ipfs
has
itself
and
the
hash
removed
function.
So
if
you
don't
need
the
data
anymore
and
you
want
it's
out
of
the
consortium,
so
it's
not
IND
anymore.
You
can
do
that.
Then,
in
the
smart
contract
itself,
we
implement
the
two
functions
at
hash:
remove
hash,
which
basically
just
emits
these
two
events
which
very
low
on
gas
to
actually
call
these
two
functions.
K
Then
all
these
members
in
the
IPV
assistance
consortium
they
will
install
a
script
on
there
respectively,
respective
ipfs
notes,
which
is
a
proxy
listener,
with
just
a
script
that
goes
and
listen
to
these
events
on
that
IP,
this
proxy
contract.
So
that's
a
general
setup
now
there
are
a
few
more
things
there.
For
example,
the
IP.
This
proxy
contract
contains
a
lists
sort
of
a
white
list
with
all
the
members
of
the
IPS
consortium
members.
So
that
means
that's
all.
K
There's
their
public
keys
are
in
there,
so
it
can
I
actually
verify
if
they
call
the
contracts
so
that
only
IP
this
member
hashes
are
pins
in
the
previous
notes
itself,
so
there
are
different
ways
of
adding
your
hashes
to
the
IP
this
consortium.
So,
first
of
all,
if
you
have
a
DAP
or
a
script
which
one
which
wants
to
pin
content,
you
can
just
call
the
function,
add
hash
or
remove.
So
that's
the
way
of
from
doing
it
from
your
tab
itself
for
the
front-end,
but
we
also
expose
these
IP
of
s.
K
Events
as
a
separate
solidity
file,
which
you
can
just
include
in
your
own
smart
contracts.
We
here
the
the
logic
of
your
DAP,
actually
needs
to
store
IP
this
content
from
from
on
chain.
Basically,
they
can
just
create
your
contracts
by
implementing
IDs,
ipfs
events,
and
then
the
consortium
members
can
add
their
contracts
to
the
IP
of
s.
K
Proxy
suite
has
a
second
list
in
there
and
if
they
added
to
the
I
previous
proxy
contracts,
then
this
proxy
listener
scripts
will
also
start
to
listen
to
these
same
events
in
all
the
specific
smart
contracts
that
they
use
now
concerning
the
governance
of
the
IP
based
consortium.
So
we
don't
want
one
single
owner
to
manage
the
consortium.
So
that's
why
we
added
multi
members.
K
So
that's
basically,
the
multi
C
codes
to
vote
on,
adding
or
removing
members
all
the
members
they
pledge
to
persist
each
other's
data
and
they
allocate
an
equal
mount
of
disk
space
or
the
sort
of
donates
all
in
equal
amount
of
disk
space
in
the
consortium.
So
it's
interesting
to
notice
that
so
we
can
deploy
one
of
these
contracts,
which
has
a
certain
quota
m--
and
all
the
members
there
they
say.
Ok,
we
are
going
to
do
this
like,
for
example,
with
the
quorum
of
10
gigabytes,
but
it's
very
easy
to
deploy
a
second
contract.
K
We
then
has
like,
for
example,
a
quorum
of
50
gigabyte,
so
you
can
just
choose
to
set
up
new
of
these
contracts.
Some
of
the
future
enhancements
that
you
want
to
bring
is
that
we
can
also
do
painting
via
whisper,
so
the
ideas,
attitudes
just
call
or
create
a
data
data
payload
in
whisper,
which
has
the
same
command
so
add
hash
and
remove
hash,
which
is
the
IP
of
s,
hatch
itself
and
time-to-live.
They
we
create
a
hash.
K
I
will
actually
sign
with
an
elliptic
curve
signature
this
payload
and
you
can
just
send
it
to
a
whisper
channel
and
we
can
have
them
the
script.
Listen
to
this
whisper
channel
and
just
pick
these
things
up
so
to
give
a
round
up
on
the
IP
vesicle
sourcing.
So
we
have
the
possibility
to
do
on
chain
pinning
by
smart
contracts.
We
can
do
off
chain
pinning
by
the
tab
or
the
script,
which
then
performs
the
transaction
we
can
with
using.
K
The
whisper
solution
also
do
off
chain
pinning
without
a
transaction,
so
this
is
my
sign
it
with
your
with
your
own
key.
We
have
the
multi
member
voting
to
Adam,
remove
participants
without
a
quotient,
but
on
top
of
that
we
also
supports
that
the
network
is
permissionless,
maybe
I'll
give
it
back
to
cubes
or
so.
J
Currently
yep
ipfs
consortium
is,
of
course
in
in
kind
of
prototype
or
or
it's
it's
like.
We.
We
proved
that
it
works,
but
of
course
we
are
inviting
everybody
to
to
join
us
in
to
make
sure
that
we
can
have
leader
persistence
in
a
central
way.
So
the
second
thing
we
want
to
talk
about
is
the
gas
station.
J
J
So
for
a
lot
of
people,
like
my
dad,
for
instance,
he
was
saying
why
why
do
do
I
need
two
coins
now
or
two
tokens,
so
our
ideal
solution
will
be
that
it
is
a
one
click
solution
in
the
front
and
in
the
app
where
people
can
actually
exchange
a
little
bit
of
their
tokens
for
gas.
Our
design
process,
it's
kind
of
funny
I
think
because
we
always
use
the
metaphor
of
the
city.
So
if
you
drive
around
the
city,
you
of
course
need
gas.
And
what
do
you
do
then?
K
Another
problem
is
also
that
if
your
app
becomes
very
successful,
you
have
to
have
a
lot
of
eater
somewhere
just
to
provide
everybody
with
some
free
gas
to
get
started.
So
we
try
to
come
up
with
a
solution
where
I
can
actually
just
do
the
exchange.
We
have
like
a
durable
solution
that
people
just
are
able
to
pay
with
our
tokens
for
getting
the
initial
gas.
K
So
it's
always
it's
also
a
two-part
solution,
so,
first
of
all,
there's
an
API
which
needs
to
run,
which
is
the
gas
station
service,
and
next
to
that
we
have
a
gas
station
contracts.
That's
deployed
locks
it
with
that,
so
people
can
actually
just
run
it
themselves.
So,
first
of
all,
you
decide
which
ERC
20
token
you
would
like
to
support.
So
in
our
case
it's
Warren
City
token,
and
then
you
send
some
initial
eater,
which
is
this
one
eater,
because
just
about
providing
initial
guesses,
it
doesn't
need
an
big
amount
of
feature.
K
You
send
it
to
the
gas
station
to
sort
of
fill
it
up
with
eater.
So
that's
the
setup
if
you
then
have
a
dab.
So
the
use
case
here
is
that
you
have
like
a
new
user
who
someone
just
sent
a
couple
of
this
swarm
city
tokus,
but
it
doesn't
have
any
gas,
so
he
can't
do
in
a
transaction.
Yet
so
the
thing
he
can
calculate
is
how
much
way
he
will
actually
need
to
perform.
K
You
know
do
the
first
transactions
that
he
wants
to
do
to
get
started,
so
we
will
ask
to
the
gas
station
service.
What
is
your
price
for
this
amount
of
way
that
I
will
need
the
gas
station?
You
will
consult
a
public
price
API
to
see
what
the
current
exchange
rate
is
for
either
to
farm
city
tokens,
and
it
will
reply
to
say.
Ok,
this
many
way
would
cost
you
that
many
swarm
city
tokens.
K
The
next
thing
that
happens
is
that
the
device
itself
or
the
tap
will
sign
an
allowance
which
is
a
twenty
function
to
the
gas
station
contracts.
For
that
amount
of
swarm
city
tokens,
and
on
top
of
that
he
will
create
an
elliptic
curve.
Signature
for
all
these
parameters,
with
the
amount
of
swarms
is
going
to
give
and
all
that
we
are
going
to
adapt
one
of
the
next
slides.
K
So
he
will
send
the
sign
transaction
back
to
the
gas
station
service
and
then
the
gas
station
service
will
verify
the
transaction.
This
will
be
coded
and
if
it
all
fits
all
the
prerequisites,
you
will
actually
send
gas
to
that
address.
So
the
address
of
the
tap
to
execute
the
allowance
call
when
you
see
that
that
gas
has
arrived,
he
will
execute
the
allowance
transaction
by
just
putting
it
into
the
transaction
pool
and
when
that
transaction
is
mined,
the
gas
station
service
will
call
a
function
in
the
gas
station
which
we
call
push
fill.
K
So
let
me
quickly
show
like
how
it
begins:
it's
not
a
complete
function,
but
just
to
get
you
to
give
you
an
idea
about
how
it
works.
So
what
is
it
if
we
push
fill
so
it
provides
the
token
address,
which
is
the
ERC
20
token
a
to
support,
or
you
want
to
exchange.
It
gives
you
a
validity
date
which
is
expressed
in
a
block
number,
so
this
sort
of
personal
exchange
rate
is
valid
as
a
validity
period.
We
had
a
random
number
to
create
some
entropy
on
the,
but
that
will
come
later
awesome.
K
You
will
say
how
many
of
these
forms
the
focus
you
can
take
from
him
in
exchange
for
how
many
way
in
eater
you
will
give
them.
They
also
provides
the
gas
tank
client,
which
is
the
address
of
the
taps.
The
wallet
address
from
the
tap
and
then
the
signature,
so
the
thing
that
the
contract
will
do.
It
will
actually
recreate
that
same
hash
with
all
these
parameters,
and
here
he
will
verify
if
the
signature
of
all
these
parameters
are
actually
match
up
to
the
address
of
the
gas
tank
lines.
K
If
so,
he
do
the
actual
exchange.
The
code
is
not
here
and
he
will
mark
that
specific
would
say
contracts
or
that
specific
configuration
to
be
executed.
So
we
can't
repeat
it
twice
concerning
risk
mitigation.
There
is
one
problem,
because
you
have
to
trust
the
gas
station
service
that
it
will
actually
also
perform
the
second
transaction
to
you.
K
If
you
give
him
the
allowance
transaction,
you
must
be
sure
that
he
actually
doesn't
does
that
push
fill
thing
so
to
mitigate
that,
so
I
told
you
before
that's
the
API
service
response
with
so
many
way,
because
that
many
sworn
tokens,
but
actually
is
also
going
to
give
a
liquor
signature
on
these
parameters.
With
his.
K
And
then
we
create
the
second
function,
which
is
called
push,
sorry
pool
fill
and
it
will
verify
the
same
parameters
which
will
actually
just
verify
if
these
parameters
were
signed
by
the
owner
and
this
function
can
be
called
by
the
gas
station
served
by
the
client
who
uses
the
gas
station.
So
he
has
a
certitude
that
if
they
do
the
exchange,
they
sort
of
mutually
give
the
allowance
to
do
exactly
that's
transaction.
K
So
why
would
you
participate
or
would
you
run
a
gas
station
because
we
we
can
define
or
you
can
define
an
uplift
for
the
price
you
sell
your
eater,
for
so
it
means
if
you
would,
for
example,
say
10%
uplift.
If
your
gas
station
sells
out
because
the
amount
feature
decreases,
the
amounts
aren't
tokens
increases.
You
will
end
up
with
when
you
sell
over
your
eater
with
an
amount
of
swarm
city
tokens
which
equals
like
one
point.
One
eater.
J
So
yeah,
so
the
result
of
that
is
that
anybody
can
just
download
that
API
script
deploy
its
own
contract
primate.
We
call
it
with
eater,
then
configure
it
like
what
er
see
20
tokens.
Do
you
want
to
accept
in
your
gas
station
then
tell
it
how
much
either
markup
you
want
to
sell
it
for
and
just
start
it.
J
K
So
as
you
see
the
gas
station
it's
at
a
certain
time,
it
needs
some
maintenance
because
it's
needs
to
be
refilled
because,
like
the
eater
gets
depleted
in
the
ends,
which
also
try
to
solve
that-
and
we
have
like
prototype
code
of
that
which
we
can
you
can
also
find
an
archetype.
So
we
created
an
integration
with
eater
Delta.
So
the
thing
is:
that's
the
gas
station
service
itself.
It
contains
a
wallet
so
when
it's,
it
has
a
certain
amount
of
swarm,
see
token
sense.
K
Almost
depleted
of
eater
the
gas
station
service
can
actually
look
into
the
eater
Delta
and
try
to
find
by
order
for
swarm
city
tokens
for
eater.
So
when
it
finds
one
you
will
actually
purchase
it
because
it's
like
anonymous
I
mean
you,
don't
need
an
accounts
or
registration
or
whatsoever.
So
we
just
created,
like
a
machine
to
machine
trading
that
actually
buys
eater
in
exchange
for
swarm
tokens.
K
So
the
thing
is,
you
can
actually
refill
or
automatically
refill
your
gas
station
with
easier
to
start
again
and
closing
that
loop,
and
so
this
can
be
fully
automated.
So
you
don't
actually
need
to
manage
the
gas
station
anymore.
You
just
can
have
it
run
when
it
does
the
exchange,
you
will
actually
end
up
with
more
ether
than
you
started
to
it.
So
you
will
end
up
in
this
situation
with
like
one
point,
one
eater
instead
of
one
eater
so.
J
I
L
Hi,
everyone
I'm
so
grateful
to
be
up
here,
so
my
name
is
Gregory
I'm
here
with
Reece
tow
and
we're
going
to
be
talking
about
region
network.
So
I'm
gonna
try
to
start
on
a
pattern
level
to
talk
about
what
it
is
that
we're
up
to,
because
we're
doing
something
that
I
think
is
sort
of
a
unique
and
unusual
at
this
moment,
use
case
of
blockchain
and
distributed
ledger
technology.
So
what
we're
up
to
is
nothing
short
of
completely
reversing
global
climate
change?
How
are
we
going
to
do
that.
L
L
L
M
If
you're,
like
most
people,
you're,
probably
feeling
a
little
hopeless
about
climate
change
and
the
damage
we've
done
to
our
planet,
well,
now,
there's
a
new
way
to
look
at
climate
change
and
how
to
deal
with
it.
That
might
just
turn
that
hopelessness
into
hope.
Climate
change,
as
we
know,
is
all
about
too
much
carbon
in
our
atmosphere.
But
carbon
is
not
our
enemy.
It's
the
building
block
of
life.
Everything
alive
is
made
of
it.
Even
us.
The
problem
and
the
solution
are
simply
a
matter
of
balance.
M
Let's
step
back
and
look
at
the
five
tools
where
carbon
is
stored
on
planet
Earth,
starting
about
500
million
years
ago,
when
plants
first
appeared
on
land,
carbon
began
to
cycle
in
an
amazing
balance
between
these
pools,
a
balance
that
allowed
for
life,
as
we
know
it
to
evolve.
Then
one
life
form
that
would
be
us
figured
out
how
to
extract
carbon
from
the
fossil
pool,
which
was
pretty
much
a
timeout
zone
for
carbon.
We've
been
burning
it
for
energy,
putting
into
play
and
disrupting
the
balance.
M
Specifically,
we've
moved
eight
hundred
and
eighty
billion
tons
of
carbon
dioxide
into
the
atmosphere,
which
is
heating
up
the
planet
and
destabilizing
our
climate.
The
oceans
have
absorbed
a
lot
of
this
excess
carbon,
throwing
off
the
oceans
balance
resulting
in
ocean
acidification
and
accelerating
a
mass
extinction
of
sea
life.
So
in
order
to
save
life,
as
we
know
it,
of
course
we
need
to
stop
burning
fossil
carbon.
The
big
question
is:
where
do
we
put
this
excess
carbon
to
get
the
cycle
back
in
balance?
M
The
good
news
is
that
the
answer
is
literally
right
under
our
feet.
It's
the
soil
plants
using
sunlight
and
water
naturally
perform
photosynthesis.
They
pull
carbon
in
from
the
air
and
turn
it
into
carbohydrates,
sugars.
Then
they
pumped
some
of
these
sugars
down
through
the
roots
to
feed
microorganisms
who
use
that
carbon
to
build
healthy,
voila
carbon
moved
the
plants
pump
it
in
and
the
soil
stores
it
nature's
living
technology
is
amazing.
M
Scientists
have
recently
discovered
that
applying
a
thin
layer
of
compost
can
help
regenerate
healthy
soil,
setting
up
an
ongoing
feedback
loop
that
brings
more
and
more
carbon
into
the
soil
each
year,
together.
With
other
regenerative
practices
like
not
tilling
the
soil,
planting
trees
and
cover
crops
and
planned
grazing,
we
can
build
and
retain
billions
of
tons
of
soil
carbon.
This
is
carbon
farming.
This
is
regenerative
agriculture,
unlike
more
carbon
in
the
atmosphere,
more
carbon
in
the
ground
is
good
for
us.
M
M
L
Well,
I,
don't
know
about
you
guys,
but
that
gets
me
inspired
every
single
time,
because
that's
a
big,
crazy
problem
and
it
turns
out
it's
actually
not
that
hard
to
solve
the
challenge
is
being
able
to
verify,
what's
actually
happening
on
a
farm
so
that
we
can
support
farmers
and
incentivize
them
to
be
actively
sequestering
carbon.
So
I
just
wanted
to
go
through
a
couple
numbers
here
to
sort
of
frame
the
bigger
problem
and
hopefully
show
how
completely
achievable
it
is.
So.
The
the
world
soils
have
320
gigatonnes
of
carbon
stoy
storage
capacity.
L
We
only
need
to
sequester
128
gigatons
over
the
next
20
years
to
completely
reverse
global
warming.
Wow.
Okay,
there's
500
million
small
farmers.
So
you
know
we
need
roughly
a
third
of
those
people
to
be
participating
on
our
network
in
our
program
actively
regenerating
soils,
so
we've
been
working
on
two
core
aspects
of
our
protocol:
one
is
proof
of
regeneration,
so
that
is
the
ability,
through
farm,
IOT,
sensors
and
satellite
protocols
and
drones
and
user
smart
phone
interaction
to
be
able
to
prove,
what's
actually
happening
on
any
given
farm
in
a
decentralized
way.
L
That
is
not
owned
by
any
central
authority
and
to
creating
a
reverse
mining
protocol.
That
is
the
ability
to
mint
tokens
by
proving
that
you've
done
something
that's
in
the
public
good,
which
is
sequestering
carbon
into
your
soils.
So
those
are
the
two
foundational
pieces
of
region
network,
so
we're
going
to
spend
sort
of
I'm
going
patterns
to
these
details.
Here.
We're
gonna
spend
a
little
bit
of
time
coming
right
up
with
Rhys
toe
going
through
one
of
our
pilot
projects,
which
is
actually
calibrating
the
proof
of
regeneration
protocol.
L
At
this
moment,
with
real-time
sensor,
data
from
a
farm
in
New
Hampshire
we're
actively
working
right
now
on
some
of
the
scaling
problems.
Our
network
is
going
to
have
to
be
sharded,
there's
no
way
around
it,
and
we
also
have
to
work
a
lot
on
identity
because
you
can't
have.
We
actually
have
to
have
proof
of
identity,
proof
of
location
as
a
core
part
of
our
protocol,
so
just
to
sort
of
frame.
N
Thank
you
very
much
Gregor,
it's
great
to
be
here,
Grigory,
of
course,
and
his
team
are
the
experts
on
regenerative
agriculture
where
streamer
comes
in
is
on
the
data
side
they're.
The
key
aim
is
to
verify
if
the
conditions
are
conducive
to
carbon
accumulation
in
the
soil.
To
answer
that
question,
you
need
lots
of
data
from.
N
N
In
practice.
What
you
have
to
do
is
to
collect,
transmit
and
analyze
all
of
the
data
in
real
time.
That's
the.
What
we
have
here
is
the
data
mechanics,
how
it
works
best
reamer,
it's
in
you
start
with
planting
the
centers
in
the
soil,
the
that's
typically
done,
maybe
not
by
the
farmer,
but
by
kind
of
specialized
REI
or
tea
companies.
Next
thing
you
do
is
the
every
time
well
sensor
called
vesicles
life.
N
They
send
the
data
data
points
as
JSON
to
streamer
end
point
and
then
reach
Network
subscribes
to
the
data
as
it
arrives
in
here.
They
analyze
the
data
in
real
time,
calibrate
the
models
verify
the
carbon
sequestration.
What
happens
in
between
is
that
the
data
automatically
kind
of
flows
through
the
peer-to-peer
stream
network
from
source
to
subscribers,
the
nodes
in
the
network
are
incentivized
by
getting
paid
by
data
token
for
their
efforts.
N
N
N
The
final
points
I'd
like
to
make
is
that
the
same
data
can
be
valuable
to
many
different
audiences
and
data
consumers.
In
this
case,
of
course,
the
region
network
is
the
prime
user,
but
this
value
in
the
data
doesn't
stop
there.
Apps
companies
can
subscribe
to
the
data
user
services
such
as
day-to-day
file,
management,
performance
monitoring,
yield,
optimization
irrigation,
harvest
forecasting
and
so
forth.
N
You
can
even
think
if
there's
any
kind
of
financial
people
in
the
audience
for
other
uses
like
having
real-time
information
about
the
state
of
the
crop
weather
events,
which
can
be
immensely
valuable
for
commodity
traders
in
storage
companies,
with
a
thought.
Let
me
hand
back
over
to
Gregory
for
great
to
recap.
L
So
all
of
a
sudden
farmers
are
back
where
they
should
be,
which
is
at
the
center
of
the
economic
system
as
the
people
who
are
providing
the
base
layer
of
wealth
for
everything
else
that's
taking
place,
so
we're
really
excited
about
that.
We're
really
excited
to
be
moving
forward
with
new
pilots
in
very
challenging
conditions.
This
is
a
photo
of
a
farm
in
Ecuador
that
we're
about
to
be
starting.
L
Another
pilot
on
so
working
with
cacao,
farmers
to
measure
the
carbon
cycle
and
carbon
sequestration
dynamics
in
in
their
ecosystem
and
I
sort
of
just
want
to
leave
everyone
with
an
invitation,
because
you
know
what
I've
learned
here
at
DEFCON
3,
which
is
my
first
Devcon,
but
what
I
also
know
from
my
work
with
farmers
all
around
the
world?
It
is
all
about
collaboration
and
the
beauty
of
this
space
is
open,
source
collaborative
approach
to
big
engineering
problems
and
I
know
we
have
a
whole
stack
of
them.
L
O
P
P
As
in
fact,
a
damage
which
is
caused
by
human
economic
activity
in
a
general
sense,
so
more
specifically,
every
deal
transaction
or
contract
has
its
collateral
damage
and
when
you
buy
a
gas
or
air
ticket,
your
air
travel
it
is.
There
is
a
collateral
damage
to
the
environment,
to
human
health
related
to
it,
and
in
fact,
in
the
nearest
years
it
has
already
become
a
business
custom
to
assess
the
damage
related
to
any
sort
of
economic
activity.
Transaction
deals
in
terms
of
carbon
dioxide
equivalent.
P
It
is
a
very
convenient
thing
to
you
know:
to
evaluate
environmental
damage
because
it
it
reflects
not
only
requirement
change
damage,
but
also
a
combustion
of
fossil
fuels
out
air
pollution,
energy
efficiency
and
that's
why
it's
not
only
important
but
very
convenient
thing
to
quantify
the
environmental
damage.
For
example,
a
few
years
ago
there
was
a
notorious
study
evaluating
the
damage
related
to
indoor
cannabis
production
in
in
the
United
States,
and
the
damage
is,
as
you
can
see,
the
energy
expenditures
equal
to
five
billion
dollars.
P
P
So
that's
the
the
basic
scheme
that
we're
talking
about.
There
are
three
principal
participants
of
the
of
the
model:
the
seller,
the
buyer
of
goods
and
services,
and
there
is
an
you
know:
mitigation
outs
of
mitigation
outcome
provider
and
the
mitigation
should
be
equal
or
greater
than
the
collateral
damage
produced
by
the
deal
between
buyer,
the
seller,
and
once
these
three
participants
agree
on
the
amount
of
damage
and
on
the
price
for
mitigation
outcome,
then
in
the
ideal
world
you
know
the
the
problem
would
be
settled
so.
P
So
that's
why
we've
created
a
platform
that
allows
anyone
or
any
existing
or
new
mitigation
program,
to
launch
its
program
on
blockchain
and
to
you
know,
cooperate
integrate
to
the
extent
they
want
to.
They
might
be
fully
independent
or
they
won't
or
they
would
want
to
merge
the
markets
or
they
would
want
to
have
a
you
know,
unified
talking
a
unit,
but
any
of
those
dozens
of
markets,
carbon
programs
or
instruments.
Carbon
compliance
units
may
enter
this.
P
So
what
we
have
achieved
for
the
moment
we
have
you
know,
issued
transferred
the
units
from
a
conventional
registry
to
the
blockchain
and
performed
pilot
transactions,
and
we
have
also
performed
a
issues
of
environmental
units
of
carbon
credits
by
passing
a
conventional
registry
directed
to
blockchain,
which
is
not
easy
because
in
a
real
world,
well,
you
still
have
to
you
know
to
have
a
very
reliable
auditor.
In
our
case,
it
was
KPMG
to
verify
sure
that
those
reductions
are
real
and
comply
with
the
rules.
P
In
fact,
as
you
know,
cryptocurrencies
also
have
quite
a
significant
carbon
footprint
and,
for
example,
the
Bitcoin
network
related
the
carbon
emissions
are
equal
to
those
of
emissions
of
Cyprus
and
etherium.
Network
are
smaller,
emissions
are
smaller,
but
still
they
equal
to
the
annual
emissions
of
Moldova.
So
it's
pretty
easy
to
imagine
that
there
is
a.
P
Developing
the
smart
contracts
and
and
everything,
but
for
the
moment
we
might
say
that
the
the
proposal
of
a
high
quality
assured
environmental
units
is
already
provided
at
the
platform.
Now
that
we
are
working
on
the
on
the
demand
as
I've
described.
You
know,
the
problem
is
related
with
regulator,
registries,
opposition
to
a
new
technology
that
would
basically
deprive
the
regulators
of
much
of
their
authority
and
would
probably
kill
the
traditional
registries.
D
Today,
my
name
is
Sergei
menshikov,
I'm
research,
team
leader
at
arrow
up
and
our
hit
scepter
in
eyepiece
I
project.
My
part
of
presentation
will
be
about
how
we
can
prepare
Mars
for
difficult
50.
As
you
know,
Mars
two
days
and
not
the
good
ways
for
humans.
It's
a
very
cold
place
and
atmosphere
is
not
friendly
for
our
breath
and
if
we
resolve
issue
with
logistics
with
space,
six
or
other
space
program,
next
question
will
be.
D
Can
we
make
Mars
a
little
bit
comfortable
for
deaf
confusing
and
it's
will
be
surprise
for
you,
but
Paris
climate
agreement
can
help
us,
because,
if
you
try
find
some
abstract
or
executive
summary
about
Paris
climate
agreement,
you
will
find
main
tasks
of
Paris
climate
agreement.
Main
task
is
keeping
a
global
temperature
rise
below
two
degrees,
Celsius,
and
it's
mean
the
Paris
climate
agreement
is
the
first
planetary
terraforming
experiment
based
on
economical
game.
D
My
main
work
is
research
capability
of
using
human
to
machine
systems
and
was
three
years
we
working
on
robot
economics
concept.
We
want
to
build
first
planetary
spine
chain
with
direct
economical
communication
between
humans
and
Nations,
but
Paris
agreement
today
is
not
a
human
to
machine
system.
It's
a
human
to
human
system
with
strong
reputation
requirements
and
this
requirements
boom
is
reticles
because
we
cannot
do
in
planetary
experiment
with
this
requirement.
But
if
we
shift
Paris
climate
agreement
on
zero,
Network
Paris
climate
agreement
can
be
human
to
machine
system
and
look
at
the
screen.
D
I
will
try
to
explain
how
it
can
be
work.
We
have
five
manufacturers
around
the
world
who
want
to
be
involved
in
Paris
climate
agreement.
At
the
same
time,
we
build
smart
cities
around
the
world,
and
this
smart
cities
have
many
types
of
different
sensors
which
can
collect
data
about
carbon
footprint
around
manufacturers.
D
Smart
cities
can
send
a
no
wrappers
to
serum
Network.
We
can
install
additional
package
on
a
serial
network,
validators
additional
package
with
carbon
created
emission
algorithm
and
after
that,
zero
Network,
an
issue.
Carbon
credits,
green
humans
can
buy
this
credit,
and
our
collected
funds
can
be
spread
between
green
economy
manufacturers,
smart
cities
who
collect
data
and
in
serial
network
validators
who
involved
in
this
process,
and
if
it
will
be
work,
we
just
can't
change
the
reforming
task
from
Paris
climate
agreement
to
prepare
Mars
to
DEFCON
filled
with
the
same
scheme
is
the
same
software.
D
So
today
we
have
a
smart
contract
package
for
carbon
credit
market
tested
with
real
participants.
We
build
the
sterilizer
application
for
human
to
human
communication
and
my
team
error.
Our
team
now
try
to
build
first
carbon
footprint,
sensors
networked
with
serial
network
validators
base
it
on
our
error
distributive.
In
the
next
year
we
will
show
first
algorithm
for
carbon
credit
issues
based
on
a
serial
network,
and
we
want
to
build
herself
for
reducing
your
carbon
footprint
only
with
carbon
credit
based
on
a
serial
network.
D
O
Q
Q
Can
any
of
you
guess
what
someone
who
does
this
on
a
pickle
plants?
Assembly
line
is
doing
yeah
she's
a
brine
displacer.
She
removes
a
certain
amount
of
brine
from
the
jar
so
that
they
can
screw
the
cap
on
and
move
it
on.
Its
way
sounds
pretty
bad
or
a
pretty
pretty
unpleasant
type
of
job.
Well,
it
gets
worse.
Q
The
fee.
Yet
system
gets
worse
than
that,
though,
because
Claudia
has
waited
so
much
time.
Unfortunately,
she's
organized
she
doesn't
have
to
resort
to
this,
but
they're
10
to
25
million
temporary
workers
living.
Similarly
in
the
United
States
alone,
and
many
of
them
can't
wait
to
get
that
money.
They
can't
wait
all
that
time,
so
they
take
recourse
to
something
called
a
payday
loan
have
any
you
familiar
with
payday
loan
yeah.
Q
We
probably
know
it's
a
very
expensive,
unpleasant
thing,
because
a
lot
of
times
these
people
never
get
out
of
the
hole,
they're
constantly
paying
more
and
more
interest.
It's
a
real
sad
situation.
The
current
Fiat
system,
Jamie
Dimon
and
his
band
of
crypto
capitalists
and
their
Fiat
system
is
screwing
these
workers
and
we
need
to
fix
it
in
crypto.
Q
So,
a
little
bit
on
me,
I'm
Greg
de
Geary
and
I'm,
a
founder
of
temp
works
software.
It's
a
software
system
that
my
dad
and
I
wrote
in
the
early
70s
and
I've
been
evolving
from
the
early
microcomputers,
and
now
my
oldest
children
run.
The
company
were
based
in
Minneapolis,
but
it's
very
simple
on
a
mature
payroll
system.
To
simply
add
an
adjustment
that
would
go
to
a
crypto
pay
card.
Q
Q
Q
F
Q
The
idea
here
would
simply
be
that
our
our
system,
as
it
evolves,
will
simply
be
pay
check,
just
like
any
other
paycheck,
with
an
adjustment
that,
instead
of
going
to
your
retirement
account,
would
also
go
to
your
crypto
account.
It's
something
that
we
need
to
do.
We
need
to
do
this
for
humanity.
We
need
to
do
it
for
all
these
temporary
workers.
Q
We
need
to
make
it
so
that
we're
living
in
a
world
where,
instead
of
cloudiest
spending
all
of
our
extra
money
and
time
driving
around
dealing
with
the
Fiat
system,
instead
she's
studying,
Python
and
aetherium,
and
it's
going
to
develop
the
next
generation
of
our
crypto
solutions.
I'd
like
to
thank
the
etherion
foundation,
Mexican
government,
all
these
wonderful
workers,
who've
made
a
it's
so
nice
I'm,
just
blown
away
by
the
quality
of
the
other
presentations
I
feel
real
honored
to
be
up
here,
but
I
think
I.
Q
R
In
order
to
enable
this
sort
of
modality,
we
normally
have
to
rely
on
financial
intermediaries.
Such
as
banks,
Mobile
Money
companies
and
cash
agents,
so
what
the
services
that
these
financial
intermediaries
provide?
You
falls
onto
two
broad
categories:
one
is
practically
accounting,
which
is
creating
accounts
for
beneficiaries,
providing
a
distribution
mechanism
such
as
SIM
cards
or
bank
cards,
and
so
on,
and
so
forth,
authorizing
transactions
when
beneficiary
spend
their
entitlements
and
then
eventually
reporting
to
us.
R
So
a
typical
setup
could
be
that
at
the
beginning
of
the
month
the
WFP
gives
a
list
of
beneficiaries
to
the
bank
saying
here's
our
beneficiaries,
here's
how
much
each
one
is
getting
and
they
will
create
the
accounts
and
load
them,
and
we
also
have
to
advance
money
for
usually
a
month
to
the
bank
to
enable
this
essentially
transfers
to
happen.
The
bank
then
contacts
the
beneficiaries,
saying
here's.
You
know
you
got
some
entitlements.
The
beneficiary
goes
to
a
store,
initiates
a
transaction,
the
store
pings,
the
bank
for
authorization.
The
bank
checks
the
account.
R
If
they
have
enough
entitlements,
they
confirm
back
and
then
eventually
pulls
back
some
money
periodic
basis.
The
bank
will
pay
the
store
for
the
actual
transactions
that
taking
place
and,
let's
say
at
the
month
end
we
get
a
report
from
the
bank
saying:
okay,
this
is
what
actually
happened.
So
a
number
of
issues
that
exist
with
this
model,
one
is
cost.
Of
course
the
bank
will
charge
a
fee
for
this
and
at
all
volumes
that
that
cost
can
be
quite
high.
R
We
make
a
lot
of
effort
to
reduce
our
financial
risk
and
also
to
protect
anniversary
privacy.
But
this
also
means
the
contracting
can
take
quite
a
long
time
which
again
would
delay
operations
and
then
there's
the
issue
of
flexibility.
So,
for
example,
if
you
wanted
to
do
Eve
hours
and
move
our
money
and
ATM
and
these
companies
don't
talk
to
each
other
and
we
don't
know
in
advance
where
beneficiaries
are
gonna
redeem
their
entitlements.
R
We
can't
really
enable
this
I
mean
the
best
we
can
do
is
you
know
divided
a
third
third,
third
or
half,
and
how?
But
it's
not
ideal,
so
it's
not
quite
flexible.
So
what
we've
done
essentially
is
replaced
the
financial
intermediary
with
blockchain,
and
so
what
we
do
is
now
we
load
the
you
know,
create
blockchain
that
accounts
for
beneficiaries
load
them
with
the
entitlements.
We
inform
the
beneficiary.
They
have
entitlements
that
they
can
use,
they
go
to
a
store,
they
initiate
a
transaction,
the
store.
R
Now
things
are
blockchain
instead
of
the
bank
for
authorization,
we
check
the
entitlements,
provide
confirmation
and
then,
at
the
same
frequency
that
the
stores
got
paid
before
we
know
essentially
which
store
to
pay
how
much
by
when
and
we
make
the
transfer
to
this
door
directly
ourselves
just
a
clarification
here.
We
have
bank
accounts
and
this
transfer
currently
is
happening
through
regular
banking
channels.
R
In
the
future
it
could
be
crypto,
for
example,
a
digital
national
currency,
but
the
difference
is
that
we
have
350
global
bank
accounts
that
we
use,
for
you
know
banking
staff,
payments,
buying,
corn
and
so
on
and
so
forth,
and
the
cost
of
payments
directly
for
us
is
really
cheap.
The
main
expense
to
us
with
the
previous
model
was
this
accounting
issuing
cards.
He
was
terminals
that
was
essentially
the
main
cost
so
yeah.
R
Just
to
clarify
that
you
know
we
have
our
corporate
banking
emperor
bank
against
our
and
then
usually
we
have
to
have
a
separate
bank
to
provide
those
distributions
and
that's
what
we've
replaced
it,
and
so
we
did
a
quick
proof
of
concept
in
the
overcoat
village
in
the
same
province
of
Pakistan
in
January
and
based
on
that
learnings.
Essentially,
we've
launched
the
pilots
in
the
ad
hoc
refugee
camp
in
Jordan
since
May
this
year.
R
So
that
is
what
that
accounting
portion
cost
us
and
the
2%
is
what's
costing
us
to
make
these
direct
payments
in
the
future
with
crypto
or
something
else
that
could
even
go
maybe
near
zero.
We're
not
sharing
any
beneficial
information
with
anyone.
So
again
in
a
refugee
context,
that's
very
important.
We're
not
advancing
any
funds
to
anyone.
Financial
risk
is
greatly
reduced.
We
have
full
control.
So
if
we
want
to
change
entitlements,
add
someone
new.
We
can
practically
do
it
in
real
time,
so
the
assistance
is
not
delayed
and
very
important
for
us.
R
R
Then,
because
we
don't
have
to
worry
as
much
about
financial
risk
and
Privacy
Protection,
then
we
can
actually
contract
people
faster,
which
means
we
can
operate
faster
and
we're
much
more
flexible.
Now,
because
all
the
accounts
are
on
blockchain,
we
can
connect
to
as
many
outlets
as
we
want
and
they're
all
coming
out
of
the
same
wallet.
So
we
can
provide
that
flexibility
to
beneficiaries,
which
again
it's
it's
great,
so
you
might
ask:
why
are
you
doing
this
on
a
blockchain?
You
could
do
this
essentially
on
the
traditional
system
and
that's
completely
true.
R
We
could,
but
one
of
the
main
reasons
is
that
there's
currently
a
lot
of
fragmentation
and
duplication
in
the
system-
and
this
is
only
for
illustration,
but
essentially
imagine
if
we
have
Bob
and
Bob-
is
receiving
assistance
from
four
different
agencies.
Each
agency
would
have
their
own
identity
system
for
Bob.
They
would
have
their
contract
with
a
separate
bank
and
they
would
channel
assistance
through
each
one
of
these
and,
of
course,
you
know,
there's
a
cost
and
effort
required
to
maintain
all
these
system.
R
The
contracts
was
the
bank
and
they
don't
talk
to
each
other
so
that
really
the
things
are
not
optimized
or
harmonized
in
a
way.
So
what
we're
hoping
to
achieve-
and
actually
one
of
the
reasons
this
exists-
is
that
that
the
technology
in
the
past
has
prevented
collaboration
among
the
agencies,
but
it's
various
ownership
issues.
R
All
of
that
you
know
open-source
system,
then
it's
not
really
owned
by
anyone,
but
it's
just
a
mutually
operated
system
that
one
can
use,
and
this
way
we
can
have
beneficiary,
let's
say
identities
or
wallets,
on
the
blockchain
for
Alice,
Bob,
Dave
and
Aaron,
and
various
UN
agencies
can
link
to
that
and
provide
whatever
service
they
want
to
provide
and
giving
our
various
networks
like
frog.
For
us,
this
WFP
was
food
retailers.
R
Someone
else
might
have
health
network
like
hospitals,
schools,
whatever
else
in
my
bibim,
can
really
dramatically
increase
the
convenience
to
beneficiaries
and
if
we're
all
using
the
same
system,
we
can
really
optimize
and
harmonize
the
global
effort
into
unprecedented
degree
with
big
data,
artificial
intelligence,
whatever
it
might
be-
and
I
think,
extremely
importantly,
the
element
of
Financial
Inclusion
I
mean
even
now
without
using
crypto.
You
know:
we've.
R
R
So
our
invitation
is
to
other
humanitarian
actors
who
don't
have
a
profit
model.
Built-In
is
to
not
reinvent
the
wheel,
so
we
have
not
set
up.
We
have
essentially
small
contracts
for
cash
transfers
and
we're
asking
event.
You
know
they
have
resources,
they
join
us
open,
source
free
and
dedicate
the
resources
to
making
the
system
better.
More
secure,
add
additional
modules
like
identity
supply,
chain,
health
whatever
and
also
make
it
available
for
free,
so
that
it
can
essentially
grow
to
be
a
system.
R
Everyone
can
use
currently
we're
using
a
private
chain,
and
mainly
that's
because
the
transaction
throughput
that
we
require
can't
be
handled
on
the
public
chain,
but
one
day
I
mean
philosophically,
were
leaned
if
we
can
ensure
security
and
privacy
and
all
of
that
to
move
there.
So
the
system
is
self-sustaining
and
doesn't
even
require
the
backing
of
WEP,
or
do
you
one
or
whoever
else
for
it
to
function
so
yeah.
Please
join
us
to
empower
the
world's
vulnerable.
We
really
look
forward
to
collaboration.
R
Essentially,
to
illustrate
the
point
that
it
can
be
done
and
using
that
learnings,
then
we've
done
our
gen
pilot,
which
is
now
going
well
as
five
months
in
production
and
we're
soon
going
to
scale
up
to
a
hundred
thousand
beneficiaries
and
a
few
months
after
that
to
five
hundred
thousand,
which
is
all
of
Jordan
and
from
there
other
countries
could
follow
that.
Have
you
know
that
could
potentially
benefit
from
this
solution.
I
have
many
many
people
to
thank,
of
course,
WP
itself
for
providing
this
earth
the
safe
space.
R
For
this
idea
to
take
root,
the
etherium
community
at
large
was
been
very
supportive.
The
etherium
foundation
for
allowing
me
be
to
be
here
today
and
get
this
message
out
and
also
rich
poor.
Oh
rich,
put
your
hand
up
who
we
met
at
the
singularity
university
around
this
time
last
year,
where
this
was
just
an
idea.
We
had
very
little
resources
and
supports,
and
we
told
him
about
it.
He
helped
us
think
through
it
and
he
pretty
much
hacked
together.
R
What
we
used
in
this
proof
of
concept
in
the
photo
that
you
see
and
he
did
it
for
free,
no
matter
how
much
we
insisted,
he
didn't,
accept
any
funds.
So
in
a
way
he
gave
us
that
initial
push
that
we
really
needed
to
get
this
pilot
flying
essentially
my
email
address
is
there.
If
anyone
is
interested
in
more
information
and
since
I
have
a
few
minutes
left
I
would
actually
like
to
show
you
a
video
of
how
how
the
system
is
currently
working.
R
So
in
Jordan
they
happen
to
use
iris
verification
even
before
we
went
so
we
wanted
to
seamlessly
integrate
into
that.
So
we
don't
change
the
beneficiary
experience,
especially
if
we're
going
to
fail
and
the
system
would
have
to
be
rolled
back
essentially.
So
what
you
would
see
here
on
one
side
is
the
cash
register
at
the
supermarket
in
one
of
the
refugee
camps,
that
you
know
they
bring
up
the
normal
bill.
The
amount
comes
up.
The
amount
is
put
into
the
iris
scanning
terminal,
the
beneficiary
scans,
their
iris.
R
R
S
R
It's
a
good
question.
The
one
of
the
things
we
cannot
assume
right
now
is
hardware
and
connectivity
for
everyone,
especially
where
we
are
right
now.
In
fact,
the
internet
is
cut
off
again
we're
building
towards
the
future.
So,
as
you
might
know,
Google
SpaceX
one
web,
a
whole
bunch
of
people
are
working
to
bring
affordable
satellite
internet
everywhere
in
the
world,
and
the
price
of
smartphones
is
dramatically
dropping,
so
I
think
by
the
time
we're
ready.
R
The
standards
right
entity
have
been
sorted
out:
zero
knowledge
cruise,
whatever
we
can
then
transfer
beneficiary
private
keys
to
them
potentially
under
devices
and
the
device
could
even
have
a
biometric
authentication
to
trigger
the
private
key.
But
for
it
to
be
it
data
to
be
stored
with
each
beneficiary
and
not
centrally,
not
sure.
If
answer
the
question.
T
T
T
R
Get
in
touch
my
email
is,
and
so
on
the
first
question,
as
I
mentioned,
we
did
our
proof
of
concept
on
the
test
nets,
but
we're
doing
we're
doing
a
private
implementation
right
now
and
I've.
You
know
we
can
handle
quite
a
bit
of
transactions
per
second,
so
million
it.
They
won't
be
a
problem,
in
fact
we're
shooting
more
for
more,
because
the
WFP
itself
has
80
million
beneficiaries
that
we
serve
in
80
countries,
and
you
know
we've
heard
over
the
past
few
days.
R
The
efforts
are
in
place
to
essentially
speed
up
everything,
potentially
even
the
main
net,
and
so
we
don't
foresee
the
throughput
to
be
a
limitation
either
now
on
what
we're
doing
privately
or
even
in
the
future,
and
then
yeah
I
mean
definitely,
that's
I,
think
the
beauty
of
small
contracts
that
you
can
program.
Whatever
logic
you
want
into
it.
So,
for
example,
we
have
school
meals,
which
means
that,
generally
speaking,
let's
say:
if
a
child
attends
school,
then
the
child
and
the
family
gets
food.
R
So
it's
in
a
way
to
ensure
children
attend
school
and
also
that
some
nutritional
outcomes
are
met
and
with
smart
devices
and
everything
our
yeah.
We
can
essentially
sort
of
automate
that
so
that
you
know
the
entitlements
going
to
a
small
contract
in
escrow
and
if
certain
conditions
are
met,
then
the
trigger
to
the
end
recipient
or
recipients.
U
Hello
everyone
so
today,
I'll
be
talking
about
something
called
ID
box.
Id
box
is
it's
a
project
for
nonprofit
building
a
foundation
for
identity
in
developing
country,
so
I
will
try
to
stay
high
level
because
it's
I
don't
know
much
off
time
to
view
a
very
technical
aspect
to
the
product.
I
would
rather
prefer
telling
you
what
I've
been
doing,
what
we've
been
doing
in
developing
countries
around
identities
and
I.
U
First
bought
myself
from
a
developer
entrepreneur
and
I've
got
a
master
need
to
Kona
engineering
and
Master
in
computer
science
and
I've
been
building
different
projects
around
FinTech
transportation,
energy
or
kind
of
project,
and
then
I
will
tell
you
why
I'm
telling
you
all
of
this
so
the
main
problem
worldwide,
already
people
a
lot
of
people
already
mentioned
this
problem,
but
you've
got
1.5
billion
people
in
the
world,
don't
like
official
identification
and
we're
talking
about
countries
where
you
don't
have
internet.
You
know
electricity
and
you
don't
want
smartphone.
U
U
So
anyone
can
actually
buy
it
and
the
private
information
from
the
user
is
not
saved
into
some
database
like
the
Estonian
government
is
doing
or
like
the
other
project
from
India.
So
we'll
quickly
show
you
a
video
what
I've
been
doing.
The
video
is
a
bit
is
nine
months
old,
so
the
project
involved.
Well,
you
don't
have
time
to
date
the
video
so.
V
That
enables
people
within
developing
countries
to
create
a
unique
identity.
The
ID
box
device
is
composed
of
a
Raspberry
Pi
SMS
chip,
fingerprint
recognition
and
a
solar
panel.
By
combining
these
components,
it
allows
us
to
create
a
secure
identity
based
service
that
will
revolutionize
the
way
that
developing
countries
participate
in
a
range
of
activities
from
Papua
New
Guinea
to
Ghana
to
Samoa.
We
are
able
to
ship
the
device
to
any
local
area,
even
if
they
don't
have
power
or
the
internet.
V
The
devices
which
cost
less
than
fifty
dollars
are
hosted
in
a
range
of
centralized
areas
like
schools,
churches,
banks
and
coffee
shops.
People
use
their
SMS
phones
to
text
the
ID
box
device
to
create
a
unique
mapping
of
their
phone
and
fingerprint
creating
a
personal
ID.
Once
someone
has
created
an
ID,
they
don't
need
to
use
the
Box
again
unless
they
want
to
assign
their
ID
to
a
new
phone
across
the
country.
Millions
of
people
do
not
have
an
ID.
This
is
John.
V
He
has
recently
heard
about
ID
box
using
his
phone
and
the
local
ID
box,
which
is
located
at
is
nearby
church.
He
is
able
to
create
a
unique
ID.
He
sends
an
SMS
to
the
ID
box
to
activate
the
registration
process.
He
puts
his
finger
on
the
fingerprint
scanner.
The
box
then
encrypts
the
fingerprint,
using
an
advanced
encryption
process
and
then
sends
the
hash
of
the
fingerprint
by
SMS
to
the
blockchain
attached
with
John's
phone
number.
V
If
the
identity
doesn't
exist,
it
then
creates
a
new
identity
on
the
blockchain
and
sends
a
confirmation
message
to
John
on
his
phone
to
confirm
his
new
unique
ID.
With
his
new
identity.
John
is
now
able
to
view
his
balance
history
of
transactions
he
has
made
and
to
securely
transfer
money
to
other
people
who
have
created
a
unique
ID.
Each
time
John
wishes
to
make
a
transfer
with
other
active
users.
His
unique
ID
is
verified
against
the
blockchain.
He
is
quickly
notified
of
his
transactions
on
his
phone.
V
U
So
this
was
the
video
from
nine
months
ago,
so
you
can
think
about
all
the
different
problem
is
not
possible
today,
the
private
key
or
unique
here
from
a
fingerprint
or
it's
not
actually
entirely.
True.
If
you
stay
to
your
very
local
village
and
you
use
like
kind
of
like
fuzzy
logic,
extractors
and
other
stuff,
that's
what
I've
actually
been
doing
in
two
different
places
in
the
world.
That
was
the
first
implementation
of
the
ID
box,
looks
like
a
bomb,
but
it's
not
so
basically
use
IV's
sensor.
U
You
got
the
phone
number
on
the
bottom
of
the
box,
don't
text
it!
That
was
my
mistake.
I
put
the
phone
number,
but
no
I
had
to
delete
it
because
people
were
sending
me
SMS
and
you've
got
a
SIM
card
on
the
right
hand
side.
So,
basically,
the
SIM
card
can
be
bought
from
anywhere
in
the
world.
So
you
ship
the
box
to
this.
Do
the
idea.
This
is
the
main
idea.
U
Basically,
you
ship
the
box
to
any
local
area,
and
then
you
just
have
to
buy
a
local
SIM
card
to
have
either
Internet
communication
or
SMS
communication.
And
then
the
solar
panel
charge
the
box
because
you
don't
have
electricity
and
you
can
also
add
a
password
and
information
on
us
on
the
screen.
Then
I
build
this
new
version.
That
was
the
new
version
of
the
ID
box
version.
U
U
So
with
the
money
I
was
was
caught
with
a
lot
of
money,
but
this
was
my
new
desk,
so
I
move
from
my
desk
desktop
to
my
living
room
and
I
build
open
to
the
printer.
So
basically,
the
idea
was
to
build
kind
of
open
source
open
to
the
entire
project
and
build
AI
that
everyone
can
actually
build
the
ID
box
to
create
a
unique
identity.
So
I
designed
and
I
put
the
file
online,
so
everyone
can
actually
don't
know
them,
and
can
they
can
play
with
the
ID
box?
U
That
was
version
so
version
one
on
the
top
and
actually
I'm
I'm.
The
first
one
I
mean
ID
box
is
the
first
one
to
create
a
first
3d
printed,
a
Java
card
that
ever
can
print
and
modify
and
can
save
like
a
personal
token
inside
from
a
dairy
fingerprint
template,
I
will
show
you
why
it's
it
can
be
used
for.
U
So
that's
the
that's
a
new
ID
box,
so
you've
got
a
Linux
distribution
system
and
a
screen
inside
rather
than
having
just
bus
baby
pi,
because
what
we
spiteful
for
people
they're
not
really
a
technology.
They
don't
really.
You
know
I
interact,
often
with
screens
and
technology
in
a
very
remote
area.
So
you
do
you
have
good
screen
and
you
can
do
different
kind
of
you
can
access
different
services,
so
you
can.
U
Six
ours
cost
them
about
one
hundred
hundred
the
local
money
over
there,
which
is
almost
the
money
they
will
receive
for
them,
son
from
their
son.
So
it's
a
complete
disaster,
but
this
it
can
use
that
to
get
away
from
receiving
money
using
an
ATM
card.
So
you've
got
the
sim
card
on
the
side.
You
got
a
solar
charging
port.
U
You
got
charging
port,
so
people
can
actually
sell
electricity
to
other
people
in
the
village.
Why
is
it
important
for
people
of
the
day?
They've
got
analog
phone,
but
they
don't
have
system
to
charge
the
analog
phones,
so
they
need
to
travel
six
hours
to
the
top
of
the
mountain
and
find
someone
who
carrying
very
huge
battery
system,
and
then
they
buy
the
electricity
with
this
system
a
local
shop,
they
can
actually
buy
the
box
and
then
sell
the
extra
city
back
to
the
people
in
the
village
and
it's
a
modular
modular
box.
U
So
basically,
what
it
is
is
you
can
increase
the
security.
Oh,
if
you're
talking
about
a
big
village
and
you
you-
you
worry
about
collision
into
creating
your
private
or
public
key.
Then
you
can
add
re
sensor
and
blood
sensor.
You
can
add
different
biometrics
system
so
using
the
multimodal
biometric
identification
system,
the
at
the
end
of
the
day.
The
private
key
obviously
is
never
saved
because
you
are
the
private
key.
U
That's
the
main
idea
of
the
project
and
you
can
encrypt
either
you
can
sign
whatever
you
want,
so
I
canta
fication
system
using
you,
you
body,
so
Nick
Johnson,
is
over
there,
so
I
create
the
I
talked
to
Nick
Johnson
and
a
few
people
from
from
the
same
foundation
like
God
and
also
other
people
from
Swami
know,
et
cetera.
So
I
built
this
first
ID
box
card.
U
They
helped
Nick,
and
so
basically,
we've
got
like,
but
the
entire
village
now
has
got
the
card,
so
I
can
send
you
the
unique
public
key
of
those
people
and
you
guys
can
actually
send
them
money
without
passing
by
a
Western
Union.
So
it's
dark
money
from
them,
which
is
very
quick
and
I've,
been
working
on
something
new
haiji
box
ad
wallet
using
a
new
java
count
applet
and
using
NFC
and
fingerprints.
U
The
USB
token
I
put
it
there
because
it
was
cool,
but
it's
not
actually
functionable
and
the
idea
is
to
basically
use
this
card
to
sign
transaction
because
those
people
in
have
a
smart
phone.
So
the
ID
box
will
transfer
the
template
or
the
private
key
to
discard,
and
then
the
user
can
actually
put
his
fingerprint
on
the
card
and
then
sign
a
token
transaction
and
then
verify
into
the
box.
That
is
the
old
person,
the
pool
concept.
U
So
I'm
gonna
talk
about
this
one,
this
one's
very
cool,
so
we
we
decided
to
go
to
Papua,
New
Guinea,
not
sure
you
guys
know
it's
Papua
New
Guinea,
it's
on
the
other
side
of
Australia
between,
and
so
you
got
New
Zealand
Australia
and
then
a
little
bit
further
you've
got
Papua
New
Guinea,
Papua,
New
Guinea.
Why
Papua
New
Guinea?
If
you
look
at
the
statistic,
Papua
New
Guinea
is
probably
one
of
the
biggest
country
in
the
world
where
they
people
don't
have
their
identity.
U
It's
about
ninety
percent
of
the
entire
population
that
are
not
registered,
so
they
don't
exist.
So
that
was
a
big
big
challenge.
If
we
can
build
the
ID
box
over
there,
if
we
can
create
identity
in
this
village
on
this
country,
then
ID
box
can
walk.
It
can
work
anywhere.
So
we
won't
day
it's
about
five
hours.
U
We
got
a
little
bit
stuck
on
the
way
like
it
was
like
five
hours,
and
so
imagine
those
those
people
first
didn't
have
a
car
if
they
have
the
bike,
it's
probably
impossible
for
them
to
go
to
the
capital
and
then
get
founded,
get
the
money
from
the
Sun
from
Western
Union
because
they
got
to
travel
six
hours
some
time
to
take
the
bus.
I'll.
Actually
imagine
what
the
bus
would
do
in
this
on
this
road.
So
the
village,
it
was
very
fantastic,
we
scored
and
aloha.
U
You
can
look
online
and
we
register
people
from
the
village
and
they
were
really
so
for
the
main
was
very
interesting
because
they
can
sell
extra
city
back
to
the
people
into
the
village,
so
they
got
incentive
of
buying
the
box
because
then
they
want
to.
If
you
can
sell
electricity
by
charging
the
box,
then
people
are
more,
they
want
to
carry,
they
want
to
take
care
of
the
box
and
then
so,
basically,
what
it
does
you
create?
You
create
your
biometrics,
send
it
to
the
card
and
also
the
public
key
of
first.
U
The
eastern
card
is
linked
with
your
phone
number
and
linked
with
your
public
key
of
your
biometrics
and
it's
a
village
of
150
250
people,
so
the
collision
into
the
village
is
not
very
high
and
you
use
also
GPS
based
location
system.
I
know,
like
proof
of
presence
of
of
position
is
not
very,
it
can
be
hacked.
U
But
if
you
add
all
this
kind
of
boundary
trick
into
the
system,
then
you
can
make
hundred
percent
sure
in
a
hundred
percent
sure,
but
that
the
person
that
was
created
was
unique,
and
this
is
the
local
shot,
the
man.
So
you
see,
we've
actually
done
first
transaction,
so
this
woman
receiving
from
the
Sun
was
in
Australia
and
they
want
to
local
shop
to
get
the
money.
U
Coming
some
looking
at
the
time
coming,
features
so
I've
been
looking
to
will
be
looking
into
knowledge
proof
so
making
sure,
because
the
main
idea
about
identity,
which
is
very
difficult
to
build,
is
you
want
to
build
a
unique
identity
system,
but
at
the
same
time
you
don't
want
to
share
your
information.
So
it's
a
bit
competitive
you
you
want
to
make
sure
I
mean
any
service
for
businesses
like
Bank
insurance
and
all
these
kind
of
big
companies.
What
do
you
want
to
do
what
they
want
to
know?
U
U
The
only
reason
why
they
actually
get
your
information
they
ask
for
your
information
is
for
them
to
make
sure
they
are
unique,
but
if
you
can
provide
a
system
first,
if
we
can
make
sure
is
they
are
unique,
then
there's
no
need
for
them
to
get
to
take
your
identity,
so
I've
been
looking
into
and
also
talking
with
Fabian
as
well
like
it's
building
the
editing
tip
protocol
into
the
eastern,
which
is
fantastic.
So
you
also
like
system
where
you
can
add
multimodal
biometric
system.
U
My
fingerprint
iris
and
blood
sensor
I'm,
saying
that
remember
that
this
information
is
not
saved
anywhere.
That's
the
main
idea,
so
only
the
day
with
key
who
the
public
key
is
saved,
and
then
you
always
need
to
go
to
the
Box
to
sign
transaction.
Well,
if
you
use
the
only
the
fingerprint
with
your
card,
then
you
can
use
the
card,
but
you
cannot
use
Ivysaur
or
finger
blood
sensor.
U
I've
been
looking
into
something
called
well
actually,
I
think
we
are
the
first
one
trying
to
do
that,
but
it's
called
them
I
called
it.
Then
it
the
identity,
a
I.
Am
it's
basically
like
an
ATM
or
more
like
for
identity
system
and
the
road
map,
so
we've
done
version
1
version
2
done
yeah
we're
playing
a
second
phase
of
the
photo
type
in
PNG.
U
So
we
got
big
institution
over
there
that,
following
the
project,
I
mean
actually
part
and
partner
with
the
project,
got
some
sort
bank,
all
the
mobile
provider,
insurance
micro,
micro
loan
micro
credit.
So
you
can
all
those
different
application
can
obviously
be
used
by
the
ID
box.
So
it's
for
nonprofit.
U
So
if
you
guys
are
very
interested
in
trying
or
helping
a
partnering,
if
you
also
building
something
with
identity,
would
be
cool,
I
think
I've
got
time
for
a
few
questions
and
if
you
know
so,
this
one
was
a
non-profit
project
and
if
only
come
this
afternoon
for
I'm
building
a
flying
carpet
so
be
a
different
discussion.
But
that's
it
was
the
pups.
W
Yeah,
so
really
briefly,
I'm
going
to
give
a
quick
overview
of
where
we
are,
which
is
that
we've
we've
got
a
transparent
donations
platform.
There's
been
live
since
May
on
Alice
dot:
si,
which
is
our
website,
then
Jacob
is
going
to
run
you
through
how
we
built
that
the
hybrid
model
that
we
use
to
bring
mass
audiences
onto
onto
the
platform
and
then
I'll
just
give
you
a
brief
overview
of
the
next
steps
for
Alice
beyond
beyond
donations.
W
So
if
you
know
Alice
it's
because
you
know
transparent
donation
platform
and
the
idea
there
is
that
you
can
give
to
a
social
project.
You
can
see
exactly
what
impact
your
money
makes
and
if
it
doesn't
make
an
impact,
then
you
get
your
money
back
and
the
project
that
we
have
live
on
the
on
the
on
the
website.
Right
now
is
a
project
run
by
a
homelessness.
Charity
called
st.
W
The
way
that
it
works
is
that
when
you,
when
you
go
onto
the
onto
the
website,
you
can
donate
your
donation
gets
held
in
escrow,
which
means
it
gets
frozen,
basically
in
smart
contract.
During
that
time,
the
charity
can
start
running
the
project
and
and
started
delivering
the
the
goals
that
it
that
it
set
out
to
achieve.
So
it
lays
out,
in
in
in
the
pilot,
st.
W
Mungo's
has
laid
out
a
certain
number
of
goals,
and
but
it's
only
when
the
goals
are
independently,
validated
that
the
money
from
the
donations
gets
paid
to
the
charity
and
in
this
case
it's
the
Greater
London
Authority
that
the
the
Mayor
of
London,
someone
in
the
housing
team.
That
reviews
the
proof.
So
if
that's
a
rental
agreement,
for
example,
if
someone's
find
accommodation,
then
they
will,
they
will
validate
that
and
at
the
same
time
the
validation
triggers
a
notification
to
the
donor.
So
they
know
exactly
what
their
money
has
paid
for.
X
X
How
the
blockchain
works,
what
is
the
blockchain
all?
What
is
necessary
is
to
have
a
plane
without
any
plug
in
so
there's
no
need
for
complicated
tools
like
a
mist
browser
and,
as
the
whole
world
mostly
uses
fiat
currency.
We
do
not
want
to
force
our
donors
to
change
fiat
into
crypto,
get
through
a
crypto
wallet
and
do
98.
We
allow
for
a
plain
credit
card
donations,
which
is
the
most
popular
way
to
donate
and
let's
see
how
it
works
out
in
the
practice.
So
that's
one
of
our
first
donors.
Actually
it's
my
mom
she's.
X
She's
67
years
old
and
she's,
not
a
crypto
geek
at
all.
She
she
stopped
casting
Kappa
the
technology
in
the
late
eighties,
when
the
video
tape
recorder
was
released,
but
she
know
how
to
use
Internet.
She
know
how
to
write
an
email
check,
the
weather,
and
recently
she
was
able
to
put
three
transactions
on
the
main
atrium
blockchain,
using
our
Alice
platform.
How
was
it
possible
so,
whenever
a
user
registers
an
account
on
our
platform,
we
on
the
user
behalf
create
a
YouTube
account
which
is
safeguarded
by
a
password.
X
So
every
interaction
every
transaction
need
to
be
signed
by
air
entering
the
password.
We
also
perform
via
tokenization.
So
when
we
accept
the
money
there
are
stable,
stable
coins
issued
that
are
pegged
one-to-one
to
the
original
value
and
the
full
Reserve
is
keep
aside
and
we're
happy
to
say
that
earlier
this
year
we
took
a
part
in
two
regulatory
sandbox
provided
by
financial
conduct
authority,
which
is
a
UK
regulatory
body
and
to
our
knowledge,
were
the
first
company
to
use
fully
regulated
digital
Pound
Sterling,
provided
by
trauma
lexlabs
and
from
a
user
perspective.
X
The
transaction
is
recorded
after
he
clicks
on
donate
button,
and
then
we
use
and
I
synchronous
relay
just
to
further
process
the
transaction
and
put
it
on
a
blockchain,
and
this
solution
proven
to
be
quite
useful
because,
roughly
a
month
after
we
launched,
we
noticed
some
strange
behavior
in
the
relay.
So
there
was
severe
delays
and
a
lot
of
retrials
and
she
was
a
day
25
June
when
there
was
an
status
ICO.
X
So
from
the
point
of
view
of
our
donors,
nothing
changed
at
all.
They
were
able
to
submit
donations
and
we
process
it
as
synchronously,
and
they
were
eventually
recorded
on
the
blockchain
and,
to
be
honest,
were
first
scared
before
we
will
start
at
the
pilot,
because
we
are
all
about
trust
and
transparency.
So,
even
if
we
miss
manage
a
single
transaction
that
will
be
disaster
for
the
whole
idea.
That's
why
we
are
using
a
triple
registration
system,
so
we
register
donation
on
a
virtual
wallet
provided
by
a
payment
provider.
X
Currently,
we
have
a
hybrid
model,
but
we
want
to
go
for
fully
decentralized
and
trustless
solution,
but
along
the
way,
we
want
to
take
small
steps
not
to
sacrifice
the
usability
and
safety
for
the
donors.
The
next
step
for
us
was
to
implement
something
that
we
call
the
geek
mode.
It's
a
section
on
our
platform.
X
Then
the
user
can
browse
and
explore
all
of
the
transactions
that
will
mate
with
his
interactions
and
for
users
who
has
a
plugin
that
allows
to
connect
to
block
train
like
a
web
tree
connector,
we
got
a
very
simple
table,
but
with
a
restricted,
read-only
access
that
you
allowed
to
check
a
balance
and
what
goals
were
achieved
by
these
users
and
before
we
allow
our
donors
to
enter
the
Wild
West
of
the
blockchain.
We
want
to
equip
them
with
safety
features
like
one
of
that
is
a
donation
wallet.
X
So
all
of
the
transfers
outside
of
the
world
cannot
be
directed
only
to
authorized
verified
projects,
because
we
want
to
shield
the
users
against
scam
attacks.
So
if
they
receive
offer
to
donate
via
slack
channel
email
from
an
untrusted
account,
they
will
be
unable
to
process
and
donation
wallet
also
offers
a
way
to
recover.
X
X
We
also
focus
on
the
security
of
the
phones
that
we
are
collecting,
so
we
other
extra
features
for
our
treasury,
like
a
two-face
transfers
when
they
need
to
be
initiated
and
violated
later
on.
The
transfers
can
be
time
locked.
We
also
introduced
a
special
rollover,
whistleblowers
that
may
raise
an
alarm
if
the
transfer
looks
suspicious,
but
without
any
acting
power
because
acting
powers
in
the
hands
of
a
curator.
My
we
found
the
transfer.
X
We
built
an
abstract
layer
around
our
data,
so
we
tokenized
that
in
the
forum
that
we
store
meta
information
about
who
was
the
author
of
the
data
at
what
are
the
access
right
and
the
full
evidence
is
kept
in
off-trail
encrypted
database.
That
is
synchronized
notarized,
the
blockchain.
Why
do
we
need
such
a
structure
forward?
I
would
refer
to
explain.
Yeah.
W
So
this
has
to
do
with
the
the
broader
vision
of
Alice,
which
actually
goes
beyond
donations,
and
obviously
transparency
is
really
important
for
small
donors,
because
they're
they're
losing
trust
in
in
charities.
But
it's
actually
also
important
for
a
whole
host
of
other
social
impact
actors,
for
example,
big
philanthropic
trusts
and
foundations.
W
They
are
increasingly
giving
grants
based
on
evidence,
so
it's
very
important
to
measure
that
government
in
the
UK,
the
US,
Europe
and
increasingly
other
countries,
shifting
also
their
grants
to
payment
for
success
models
where
they
only
pay
when,
when
outcomes
social
outcomes
have
been
achieved,
and
then
over
the
last
10
years
or
so,
there's
been
a
real
rise
in
an
alternative
source
of
funding
in
the
form
of
impact
investment.
So
what
impact
investors
do
is
when
they
invest?
W
Obviously,
they
they're
looking
for
a
financial
return
but
they're
also
looking
for
a
social
or
environmental
return,
which
means
that
it's
really
important
for
them
to
track
that
data,
and
the
big
problem
is
that,
unfortunately,
when
it
comes
to
impact
data,
we're
still
in
prehistoric
times,
everybody
is
systematically
reinventing
the
wheel.
Everybody
is
measuring
things
quite
differently.
The
standards
that
exist
aren't
really
aren't
really
widespread
and,
really,
importantly,
all
of
that
data
tends
to
get
stuck
in
the
individual
databases
of
all
of
these
organizations.
W
So
it
makes
it
really
difficult
to
access
and
compare
and
benchmark
projects
to
see
which
ones
are
the
are
the
most
effective.
So
we
are
going
to
build
three
main
evolutions
on
on
the
Allis
Network.
The
first
one
is
really
starting
to
break
down
what
goes
in
that
impact
data,
so
we're
going
to
require
that
that
social
organisations
break
down
their
their
projects
across
five
dimensions.
Those
five
dimensions
have
been
developed
by
the
impact
management
project
with
who
we
we're
collaborating
it's
a
big
open
source
research
project.
W
That's
done
some
research
amongst
over
700
practitioners
all
around
the
world
to
to
build
a
framework
for
how
to
to
measure
manage
impact
and
effectively
the
projects
will
be
tagged
across
those
five
dimensions
and
we're
also
going
to
require
social
organizations
and
projects
to
produce
regular
progress
reports
against
internal
performance
indicators
and
the
way
that
we're
going
to
enforce.
That
is
that
they
will
be
rewarded.
W
They'll
get
paid
for
for
submitting
those
those
reports
and
if
they
don't
submit
them
on
time,
so
for
example,
then
they
will
be
punished
with
all
further
payments
withheld
until
they
do
and
that
payment
for
reporting.
Is
that
also
at
the
core
of
what
of
what
we
do,
because
what
we,
what
we're
going
for,
is
not
making
impact
projects
cheap
but
effective.
So
you're,
probably
familiar
with
this
kind
of
pie,
chart
that
social
organizations
produce
showing
exactly
how
much
money
goes
to
admin.
W
How
much
money
goes
to
PR
or
fundraising,
how
much
gets
to
the
front
line,
and
actually
we
don't
think
that
that's
the
most
important
thing
at
all,
because
it
doesn't
really
tell
you
anything
about
how
effective
they
are.
What
we
prefer
to
focus
on
is
tracking
the
impact,
so
how
many
people
have
been
helped?
Is
this
social
project
actually
improving
the
lives
of
the
of
the
people
that
it
serves
so
we're
not
tracking
the
money,
we're
tracking
the
impact?
W
The
second
major
evolution
to
the
network
is
that
we
are
going
to
incentivize
users
to
take
all
of
that
impact
data.
That's
been
produced
by
your
projects
across
the
network
and
crunch
that
data,
so
that
you
can
really
surface
the
most
effective
projects,
so
that
funders
can
can
help
scale
them
and
we're
also
going
to
build
prediction
markets
that
allow
users
to
bet
on
whether
the
the
proposed
changes
to
projects
that
are
submitted
in
the
in
the
regular
progress
reports,
for
example,
are
likely
to
increase
or
decrease
the
impact
of
of
those
projects.
W
W
That's
focused
on
impact
investment,
because
what
we
have
right
now
is
that
donors
give
to
give
to
the
the
social
projects
that
those
funds
are
held
in
escrow
and
they're
only
paid
out
when
the
goals
are
validated
now
the
problem
there
is,
if,
especially,
if
you're,
a
smaller
charity,
you
might
not
have
the
financial
resources
to
run
your
project
before
getting
the
money.
So
that's
where
the
impact
investors
come
in,
they
will
provide
some
working
capital,
some
seed
capital,
that
they
will
give
to
the
to
the
to
the
project,
so
they
can
start
them
effectively.
W
What
they'll
be
doing
is
underwriting
the
risk.
So
if
the
project
never
produces
any
results,
if
it
never
achieves
its
goals,
the
investors
will
lose
their
money,
but
if
it
does
achieve
its
goals
and
it
gets
paid
from
from
the
donations
in
escrow,
then
part
of
those
donations
will
go
to
reimburse
that
investment.
So
that's
that's
pretty
much
it.
That's
the
that's!
W
The
broader
vision,
we're
building
a
fully
integrated
decentralized
social
impact
ecosystem,
so
that
social
organizations
can
tap
into
donations
and
grants
and
impact
investment
so
that
they're
their
impact
is
properly
managed
and
transparent
and
accessible
supported
by
validation
market.
So
they
can
easily
choose
validators
for
their
projects,
whether
those
are
human,
validators
or
Oracle's,
and
by
knowledge
sharing
markets
that
help
crunch
that
data
and
surface
the
the
most
effective
projects,
and
that's
really
what
we're
all
about
is
really
identifying
the
best
projects,
helping
them
scale
and
the
cutting
transaction
costs
across
across
the
network.
W
Now
we've
just
published
a
white
paper
today,
just
a
few
hours
ago,
so
we
invite
everybody
to
go
onto
our
website
and
read
that
it
covers
everything
that
we've
just
that
we've
just
explained
in
in
a
lot
more
detail,
as
well
as
some
some
really
interesting
stuff
that
we
that
we're
building
as
well
that
you'll
that
you'll
be
able
to
read
about
on
the
on
the
white
paper
like
a
decentralized
fund,
to
help
to
help
smaller
organizations
really
design
and
and
run
their
projects
transparently
on
the
network.
Thank
you
very
much.
E
W
E
Please
Christian
sorry
over
here,
hello
hi.
This
is
quite
a
tedious
little
question.
Actually
just
the
matter
of
issuing
receipts
to
donors.
I've
always
found
that
to
be
just
a
real
pain
in
the
backside,
but
if
it
particularly
for
comes
via
a
bank
account,
so
does
your
module
have
what
what
do
you
do
by
way
of?
How
do
you
issue
receipts
to
your
mother
when
she's
paid
her
donation
so.
W
That's
that's
something
that
that
we
actually
spent
a
lot
of
time
on.
Currently
the
platform
can
be
used
only
in
the
in
the
UK,
and
we
went
through
all
the
regulatory
hoops
to
make
sure
that
that
people
could
get
receipts
when
they
donate.
They
can
actually
apply
Gift
Aid.
If
you
know
how
that
works
in
the
UK,
it's
a
way
of
gifting
the
taxes
to
the
to
the
charities,
and
we
had
to
get
the
the
regulatory,
the
regulatory
authorizations
to
do
that.
W
Y
When
you
say
the
nation,
it
traditionally
points
to
a
gift
you're,
giving
money
to
someone
or
just
to
an
entity,
and
you
do
not
necessarily
ask
for
something
in
return.
Well,
in
this
model,
you
ask
for
performance,
so
I
would
suggest
turning
a
little
bit
these
terms
around,
because
the
nations
are
gifts,
and
this
is
not
what
you're
doing
in
this
model.
So.
W
But
so
it's
not
so
much
commercialization
as
just
tracking
the
the
impact
so
I
think
all
of
the
your
your
points
absolutely
valid.
I
think
the
reality
is
that
the
lack
of
trust
or
the
decline
in
trust
is
very
real
and,
unfortunately,
what
happens
is
that
then
people
get
completely
obsessed
in
this
really
toxic
debate
around
how
people
spend
their
money
and
that's
what
I
was
referring
to
before
how
much
goes
to
admin?
W
How
much
goes
to
fundraising,
and
that
for
me,
is
actually
completely
counterproductive
because
it
leads
it
leads
to
charities
trying
to
be
as
lean
as
possible.
They
end
up
under
investing.
They
can't
pay
high
quality
people
to
run
projects,
and
so
that's
why
we
track
the
data
so
and
the
performance
the
way
that
we
mitigate.
What
you're
saying:
that's
where
we
bring
in
the
impact
investors.
W
It's
also
we're
going
to
implement
some
models
where
not
all
of
the
money
gets
paid
when
the
impact
is
achieved,
so
you
could
have
a
model
where
half
of
your
donations
get
paid
to
the
charity,
upfront
and
then
half
of
the
half
of
the
payment
gets
paid
upon
achieving
the
results.
But
really
what
it
is
is
just
an
incentive
mechanism
to
make
sure
that
the
the
the
social
organizations
deliver
on
on
the
impact
that
they
that
they
promised
essentially
and
restore
that
trust.
W
And
ultimately,
what
we
want
to
do
is
just
help
them
raise
a
lot
more
money
than
they
are
raising
at
the
moment.
So
they
can
really
tackle
social
and
environmental
problems
at
scale
and
I.
Think
on
the
on
the
last
on
the
last
point,
or
the
second
point
that
you
made,
which
was
a
lot
of
people,
don't
donate
online,
that's
true,
but
you
know
what
a
lot
less
people
even
donating
crypto.
So
that's
why
we're
adopting
a
hybrid
model?